quiz 6 - Flashcards

Authentication and Account Management (lecture 8 and 11)??

1
Q

________________ (BCP) is a strategic document that provides alternative
modes of operation for business activities

three goals:
* Business recovery planning
* Crisis management and communications
* Disaster recovery

_________________(COOP) is a federal initiative to encourage organizations
to address how critical operations will continue under a broad range of negative
circumstances

_____________(BIA)
* A BIA identifies business functions and quantifies the impact a loss of these functions may
have on business operations

A BIA will help determine the _________________, which is the activity that serves
as the core purpose of the enterprise

  • A BIA can also help in the ____________ that support the mission-
    essential function
  • Identifying a ______________
A

business continuity plan

Continuity of operation planning

Business Impact Analysis
mission-essential function
identification of critical system
single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When users create passwords, a one-way hash algorithm creates a message ______ of the password

Attackers work to steal the file of ___ ___. Which can be used to impersonate the user.

___ ___ can also be used, create known digests known as ___

A

digest (or hash)
password digests

password cracker, candidates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ____ ____attack selects one or a few common passwords and then enters the same password when trying to login to several user accounts

A

password spraying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In an ___________________, every possible combination of letters, numbers, and characters used to create encrypted passwords are matched against the stolen hash file

  • In an _________________, the same account is continuously attacked (called pounded) by entering different passwords

an _______________ uses the stolen hash file
* This is the slowest yet most thorough method

A

automated brute force attack

online brute force attack

offline brute force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A _____ _____ conducts a statistical analysis on the stolen passwords that is used to create a mask to break the largest number of passwords

3 steps

A

rule attack

  1. sample of stolen password plaintext file is obtained
  2. statistical analysis is performed to determine the length and characters of the passwords
  3. A series of masks are generated that will be most successful in cracking the highest percentage of passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In a ____ ____, the attacker creates digests of common dictionary words and compares against a stolen digest file

____ ___ is the search for any two digests that are the same

A

dictionary attack

Birthday attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ ____ attack is a dictionary attack that uses a set of dictionary words and compares it with the stolen digests

A

Pre-image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ ___ create a large pregenerated data set of candidate digests

advantages over other attack methods
can be used ______
faster than _____ attacks
less ____ required

A

Rainbow tables

repeatedly
dictionary
memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Using _________________ as candidate passwords is the foundation of cracking today

A

stolen password collections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

__________ is a type of authentication where a user is using more than one type of authentication credential

A

mfa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A _____ ____holds information to be used as part of the authentication process

disadvantages
- _____ and_____ required
- can be _____

A

smart card

hardware and software

cloned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

smart cards
Stealing the information is often done by a process called _______

A

skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____________:
Synched with an authentication server where the code is generated from an
algorithm
▶ The code changes every 30 to 60 seconds

_________ is “event-driven” and changes when a specific event occurs

A

Time-based one-time password (TOTP)

HMAC-based one-time password (HOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is using a smartphone for authentication secure

why

A

no

messages can be phished
malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ____ ____is a dongle that is inserted into the USB port or Lightning port or held near the endpoint

A feature of security keys is _____, which is a key pair that is “burned” into the security key during manufacturing and is specific to a device model.
- has certificates that chain to a root cert

A

security key

attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______ _____ uses a person’s unique physical characteristics for
authentication

A

Physiological biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

specialized biometric scanner

____ ___ uses the human retina as a biometric identifier

fingerprint scanners

____ fingerprint scanner takes a picture and compares with image on file

____ fingerprint scanner uses a small slit or opening

A

Retinal scanner

Static
Dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

other human characteristics that can be used for authentication

A

vein
gait/the way they walk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

standard input devices

  • ____ ___ uses a standard computer microphone to identify users based on the
    unique characteristics of a person’s voice
  • An ____ ___ uses a standard webcam to identify the unique characteristics of the iris
  • ____ ____ uses landmarks called nodal points on human faces for authentication
A

Voice recognition

iris scanner

Facial recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

biometric disadvantages
______ of hardware

some amount of _____
The ____ ____ ___ (FAR) is the frequency at which imposters are accepted as genuine
* The ____ ___ ___ (FRR) is the frequency that legitimate users are
rejected

A

cost
error

false acceptance rate
false rejection rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

_____ biometrics relates to perception, thought process, and understanding of the
user

It is considered easier for the user to remember because it is based on user’s life
experiences

also called knowledge based authentication

_____ passwords

A

Cognitive

picture passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

_____ biometrics authenticates by normal actions the user performs

a type of this is keystroke dynamics
- uses two variables
– dwell time - time to press and release key
–flight time - time between keystrokes

A

Behavioral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

protecting password digests
____: consists of a random string that is used in hash algorithms
– add a random string a a password before it is hashed
–makes dictionary and brute force attacks much slower

key ______ - is a specialized password hash algorithm that is intentionally designed to be slower
algorithms:

A

salts
stretching

brypt and PBKDF2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The most critical factor in a strong password is ____

A

length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A ____ ___is a secure repository where users can store passwords (also known
as a password manager)
3 types

____ ___ are a secure hardware-based solution to store passwords

A ______________________is a removable external cryptographic device that
includes an onboard random number generator and key storage facility

A

password vault
- generators
- online vaults
- password management applications

Password keys

hardware security module (HSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

__________uses one authentication credential to access multiple
accounts or applications

A

Single sign-on (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

_____ was originally designed for remote dial-in access to a corporate network.
is typically a device such as a wireless AP that is responsible for sending
user credentials and connection parameters to the ______ server

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

________ is an authentication system developed at MIT
* It uses encryption and authentication for security
* Works like using a driver’s license to cash a check

Difficult to ____
* Contains information linking it to the user
* It lists ____
* ____ some future date

A

Kerberos

copy
restrictions
Expires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

__________ is commonly used on UNIX devices that communicates by forwarding user
authentication information to a centralized server

A

TACACS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

TACACS
meaning
current version

A

Terminal Access Control Access Control System

TACACS+

31
Q

A ___ ___ is a database stored on the network that contains information about users and network devices
- make it easier to grant privileges or permissions to network users and provide authentication

________________________ is an XML standard that allows secure web domains to exchange user
authentication and authorization data.
- allows a user’s login credentials to be stored with a single identity provider instead of being stored on each web service
provider’s server

A

directory service

Security Assertion Markup Language (SAML)

32
Q

___ is a framework for transporting authentication protocols instead of the authentication
protocol itself

A

EAP

33
Q

Critical devices can be fitted with a _____________ in case one power supply fails

  • An _________________________ is a device that maintains power to equipment in the event of an interruption in primary electrical power source
A

dual power supply

uninterruptible power supply (UPS)

34
Q

______ UPS
- cheaper
- charged by main power supply
- alternates between primary power when needed

________ UPS
can serve as a ____ ___
runs off its battery while main power charges battery
not affected by dips in voltage

A

off-line

on-line
- surge protector

35
Q

A ____ ___ can be powered by diesel, natural gas, or propane

A

backup generator

36
Q

Recovery sites are backup sites that may be necessary if flood, hurricane, or other major
disaster damages building

3 types

A _____site is generally run by a commercial disaster recovery service and has the
following characteristics:
* Duplicate of the production site
* Has all needed equipment
* Data backups can be moved quickly to the ____ site

A ___ site provides office space but the customer must provide and install all equipment
needed to continue operations
* No backups immediately available
* Less expensive than a hot site
* Takes longer to resume full operation

A __-_ site has all the equipment installed but no active Internet or telecommunications
facilities
* No current data backups
* Less expensive than a hot site
* Time to turn on connections and install backups can be half a day or more

A

hot

cold

warm

37
Q

_________________(RPO) is the maximum length of time organization can tolerate between backups

  • ______________ (RTO) is the length of time it will take to recover backed up data
A

Recovery point objective

Recovery time objective

38
Q

CDP meaning

CDP performs continuous backups that can be restored immediately

  • It maintains a historical record of all changes made to data
  • CDP creates a ____ of the data (like a reference marker)
A

continuous data protection

snapshot

39
Q

Which type of disk drive redundancy uses separate controller cards for each disk and
duplicates the contents of one disk to a second disk?
a. Disk striping
b. Disk mirroring
c. Disk duplexing
d. Distributed parity

A

Answer: c. Disk duplexing
Disk duplexing is a variation of RAID 1 (disk mirroring) in which separate controller
cards are used for each disk to protect against disk controller failure.

40
Q

A ______ a document that outlines specific requirements or rules that must be met and generally has the following characteristics:

  • Communicates a consensus of judgment
  • Defines appropriate behavior for users
  • Identifies what tools and procedures are needed
  • Provides directives for Human Resources action in response to inappropriate behavior
  • May be helpful if it is necessary to prosecute violators
A

policy

41
Q

Which standard allows secure web domains to exchange user authentication and authorization
data?
a. LDAP
b. SAML
c. MS-CHAP
d. TACACS

A

Answer: b. SAML
Security Assertion Markup Language (SAML) is an XML standard that allows secure
web domains to exchange user authentication and authorization data.

42
Q
A
43
Q

______________ (DRP) focuses on protecting and restoring information technology
functions

A

Disaster Recovery Plan

44
Q

Fault tolerance refers to a system’s ability to deal with malfunctions

  • The solution to fault tolerance is to build in _____
  • Which is the use of duplicated equipment to improve the availability of a system

A goal is to reduce a variable known as the _____________________ which is the average amount of time that it will take a device to recover from a failure that is not a
terminal failure

A

redundancy

mean time to recovery (MTTR)

45
Q

To protect an endpoint from malware infections, programs are available that can “freeze”
a computer to prevent it from accepting any changes from malware
* This makes the computer _________

A

nonpersistent

46
Q

______________measures the average time until a component fails
and must be replaced

A

Mean time between failures (MTBF)

47
Q

_______________________(RAID) uses multiple hard disk drives to
increase reliability and performance

A

_______________________(RAID) uses multiple hard disk drives to
increase reliability and performance

48
Q

A ________________SAN) is a dedicated network storage facility that provides access
to data storage over a high-speed network

A

storage area network (

49
Q

________ is a technique for creating more than one physical path between devices and a SAN

A

Multipath

50
Q

_____________________ (SDN) controllers can increase network reliability and may lessen the need for redundant equipment

A

Virtual software defined-network

51
Q

_______________ requires that if a fraudulent application of a process could
potentially result in a breach of security, the process should be divided between two or
more individuals

A

Separation of duties

52
Q

___________ involves preventing one individual from having too much control

A

Job rotation

53
Q

_______________
* An audit of the employee’s activities is usually scheduled while they are away

A

Mandatory vacation

54
Q

A ______ ____ __s designed to ensure that all confidential or sensitive materials are removed from a user’s workspace and secured when the items not in use

A

clean desk policy

55
Q

_____ _____ means that only the minimum amount of privileges necessary to perform
a job or function should be allocated

Employee _____ refers to the tasks associated with hiring a new employee
▶ Background check and employee nondisclosure agreements are typically part of
this step

employee ____ entails actions to be taken when an employee leaves an
enterprise
▶ Backing up all employee files, archiving email, forwarding email to a manager,
disabling the employee’s accounts are among the steps that should be taken

A

least privilege

onboarding

offboarding

56
Q

An acceptable use policy (AUP) is a policy that defines actions users may perform while
accessing systems and networking equipment

A
57
Q

________________ (BCP) is a strategic document that provides alternative
modes of operation for business activities

three goals:
* Business recovery planning
* Crisis management and communications
* Disaster recovery

_________________(COOP) is a federal initiative to encourage organizations
to address how critical operations will continue under a broad range of negative
circumstances

_____________(BIA)
* A BIA identifies business functions and quantifies the impact a loss of these functions may
have on business operations

A BIA will help determine the _________________, which is the activity that serves
as the core purpose of the enterprise

  • A BIA can also help in the ____________ that support the mission-
    essential function
  • Identifying a ______________
A

business continuity plan

Continuity of operation planning

Business Impact Analysis
mission-essential function
identification of critical system
single point of failure

58
Q

______________ (DRP) focuses on protecting and restoring information technology
functions

A

Disaster Recovery Plan

59
Q

Fault tolerance refers to a system’s ability to deal with malfunctions

  • The solution to fault tolerance is to build in _____
  • Which is the use of duplicated equipment to improve the availability of a system

A goal is to reduce a variable known as the _____________________ which is the average amount of time that it will take a device to recover from a failure that is not a
terminal failure

A

redundancy

mean time to recovery (MTTR)

60
Q

To protect an endpoint from malware infections, programs are available that can “freeze”
a computer to prevent it from accepting any changes from malware
* This makes the computer _________

A

nonpersistent

61
Q

______________measures the average time until a component fails
and must be replaced

A

Mean time between failures (MTBF)

62
Q

_______________________(RAID) uses multiple hard disk drives to
increase reliability and performance

A

redundant array of independent devices

63
Q

A ________________(SAN) is a dedicated network storage facility that provides access
to data storage over a high-speed network

A

storage area network

64
Q

________ is a technique for creating more than one physical path between devices and a SAN

A

multipath

65
Q

_____________________ (SDN) controllers can increase network reliability and may lessen the need for redundant equipment

A

Virtual software defined-network

66
Q

_______________ requires that if a fraudulent application of a process could
potentially result in a breach of security, the process should be divided between two or
more individuals

A

Separation of duties

67
Q

___________ involves preventing one individual from having too much control

A

Job rotation

68
Q

_______________
* An audit of the employee’s activities is usually scheduled while they are away

A

Mandatory vacation

69
Q

A ______ ____ __is designed to ensure that all confidential or sensitive materials are removed from a user’s workspace and secured when the items not in use

A

clean desk policy

70
Q

_____ _____ means that only the minimum amount of privileges necessary to perform
a job or function should be allocated

Employee _____ refers to the tasks associated with hiring a new employee
▶ Background check and employee nondisclosure agreements are typically part of
this step

employee ____ entails actions to be taken when an employee leaves an
enterprise
▶ Backing up all employee files, archiving email, forwarding email to a manager,
disabling the employee’s accounts are among the steps that should be taken

A

least privilege

onboarding

offboarding

71
Q

An ___ ____ ___ (AUP) is a policy that defines actions users may perform while
accessing systems and networking equipment

A

acceptable use policy

72
Q

____ ___
* Several policies relate to the management and functioning of the organization:
* Change management
* Change control
* Asset management

A

Organizational Policies

73
Q

____ ___
* Data classification policy is a written policy that addresses assigning labels to data based
on their importance
* Data governance policy is a series of formal guidelines regarding the data itself
* Data retention policy specifies how long data should be retained after it has fulfilled its
initial purpose

A

Data Policies

74
Q

The manager of your company is concerned that the finances are at risk because Jane, the
accountant, is the only person in the organization that has responsibility over the money that
goes in and out of the business. What policy should he put in place to ease his concerns?
a. Least privilege principle
b. Separation of duties
c. Nondisclosure agreement
d. Acceptable use

A

Answer: b. Separation of duties
Separation of duties requires that if a fraudulent application of a process could
potentially result in a breach of security, the process should be divided between two
or more individuals